US 20100082557 A1
A method is provided in one example implementation and the method includes receiving a query for a policy (e.g., a multi-media session) that pertains to a selected one of first and second endpoints. Each endpoint interfaces with their respective session initiation protocol entity, which interacts with a session border controller (SBC). The method further includes negotiating credentials via a policy element and a selected SBC and determining, via a selected policy within the policy element, whether a requested communication session is prohibited or conducted between the endpoints. In more specific embodiments, each SBC makes a mapping between signaling entity information and pre-configured SBC virtual private network (VPN) information used for dynamic configuration of the communication session, and wherein a SIP [or other communication protocol] adjacency configuration is created, where adjacency characteristics are defined for each enterprise in which the endpoints reside.
1. An apparatus, comprising:
a policy element operable to receive a query for a policy that pertains to a selected one of first and second endpoints, wherein each endpoint interfaces with their respective session border controller (SBC) that communicates with a respective session initiation protocol entity, wherein credential negotiation occurs between the policy element and a selected SBC such that a selected policy within the policy element determines whether a requested communication session is prohibited or conducted between the endpoints.
2. The apparatus of
3. The apparatus of
4. The apparatus of
5. The apparatus of
6. The apparatus of
7. The apparatus of
8. The apparatus of
9. The apparatus of
10. The apparatus of
11. The apparatus of
12. The apparatus of
13. The apparatus of
14. A method, comprising:
receiving a query for a policy that pertains to a selected one of first and second endpoints, wherein each endpoint interfaces with their respective session initiation protocol entity, which interacts with a session border controller (SBC);
negotiating credentials via a policy element and a selected SBC; and
determining via a selected policy within the policy element whether a requested communication session is prohibited or conducted between the endpoints.
15. The method of
16. The method of
17. Logic encoded in one or more tangible media for execution and when executed by a processor operable to:
receive a query for a policy that pertains to a selected one of first and second endpoints, wherein each endpoint interfaces with their respective session initiation protocol entity, which interacts with a session border controller (SBC);
negotiate credentials via a policy element and a selected SBC; and
determine via a selected policy within the policy element whether a requested communication session is prohibited or conducted between the endpoints.
18. The logic of
19. The logic of
20. The logic of
21. A system, comprising:
means for receiving a query for a policy that pertains to a selected one of first and second endpoints, wherein each endpoint interfaces with their respective session initiation protocol entity, which interacts with a session border controller (SBC);
means for negotiating credentials via a policy element and a selected SBC; and
means for determining via a selected policy within the policy element whether a requested communication session is prohibited or conducted between the endpoints, wherein each SBC makes a mapping between signaling entity information and pre-configured SBC virtual private network (VPN) information used for dynamic configuration of the communication session, and wherein a SIP adjacency configuration is created, where adjacency characteristics are defined for each enterprise in which the endpoints reside.
This invention relates in general to the field of communications and, more particularly, to a system and a method for enabling communication sessions in a network environment.
Networking services have become increasingly important in today's society. In certain architectures, service providers may seek to offer multimedia services for their end users. In order to ensure a fast deployment of high quality multimedia sessions between businesses as a service, it is important to allow for scale, accounting, security, and enforcement of granular policies.
It is possible to establish multimedia sessions between two businesses through manual configurations. However, that process is complex, not scalable, more error prone, less secure, and generally time-consuming. Accordingly, the ability to minimize these problems or to optimize these communications presents a significant challenge to service providers, network administrators, component manufacturers, and system designers alike.
To provide a more complete understanding of the present invention and features and advantages thereof, reference is made to the following description, taken in conjunction with the accompanying figures, in which:
A method is provided in one example implementation and the method includes receiving a query for a policy that pertains to a selected one of first and second endpoints. Each endpoint interfaces with their respective session initiation protocol entity, which in turn interacts with a service provider's session border controller (SBC). The method further includes negotiating credentials via a policy element and a selected SBC and determining, via a selected policy within the policy element, whether a requested communication session is prohibited or conducted between the endpoints. In more specific embodiments, each SBC makes a mapping between signaling entity information and pre-configured SBC virtual private network (VPN) information used for dynamic configuration of the communication session, and wherein a SIP adjacency configuration is created, where adjacency characteristics are defined for each enterprise in which the endpoints reside. In still other embodiments, a selected SBC checks in its local database for a log of an existing configuration between two of the endpoints for the communication session requested. If an entry exists in the local database, an expired timer will be reset and the communication session will be authorized.
SIP session control element 16 could easily be consolidated into SBCs 18 a and 18 b. In another example, such as that depicted by
Note that although referenced in a service provider area or identified as being part of a business-to-business (B2B) framework, any of these components may be managed or controlled by any suitable entity. In other embodiments of the present invention, the ownership of
In accordance with teachings of the present invention, communication system 10 can automate the authorization and creation of network configurations to enable two parties to initiate a high-quality multimedia session with each other. Furthermore, communication system 10 can enable a dynamic set-up of two businesses or parties to establish a high-quality multimedia session, after performing appropriate policy, call admission control (CAC) operations, and authentication checks.
The solution proposes an integrated process to offer endpoints a multimedia session service in a granular, dynamic, time efficient, manageable, and scalable fashion. Moreover, the proposed solution allows the service provider signaling entities to securely and dynamically exchange and gather information about the key characteristics of the business parties involved in the multimedia session. This information will, in turn, be verified against granular business policies and used, upon approval, to automatically generate and push an appropriate set of configurations. This would allow for the two disjointed virtual private networks (VPNs), which are operated by two distinct entities, to be bridged in a secure fashion for conducting multimedia sessions.
Before turning to some of the operational aspects of embodiments of the present invention, some preliminary information about typical B2B protocols is provided. The term ‘B2B’ as used herein is meant to encompass all scenarios in which there are two distinct entities, which seek to communicate with one another. The following foundational information may be viewed as a basis from which the present invention may be properly explained. Such information is offered earnestly for purposes of explanation only and, accordingly, should not be construed in any way to limit the broad scope of the present invention and its potential applications.
In current architectures, a service provider offers a B2B platform where it manages connectivity, billing, call control, etc. In a traditional Internet Protocol (IP) world, the arrangement of
In order to ensure a fast deployment of high quality multimedia sessions between businesses as a service, it is important to allow for scale, accounting, security, and enforcement of granular policies. It is possible to establish multimedia sessions between two businesses through manual configurations. The manual configuration has many shortcomings, as it offers a process that is complex, not scalable, more error prone, less secure, and generally time-consuming. Moreover, such a process does not allow for granular policy enforcement, dynamic policy configuration, and subsequent modifications.
Concisely stated, the existing manual process was not conceived as a solution adapted for the creation of a service. In addition, such a flawed process fails to address some of the essential requirements of service providers, namely; it does not allow them to easily leverage unified communications and multimedia technologies, which engenders a profitable business service.
In operation of an example flow, consider a case where Enterprise A wishes to call Enterprise B. Policy element 24 and billing element 22 will be configured with guidelines for what is permitted (i.e., the parameters) in this communication scenario (e.g., the timing, the number of calls, etc.). When Enterprise A wants to initiate this call, the policy (which could be associated with a multi-media session, a voice-call, etc.) will be pushed dynamically to devices in the service provider network (e.g., SBCs). These devices will look at the policy and then make decisions as to which activities to permit or to disallow. Thus, the architecture of FIG. 1 focuses on the dynamic application of policies (inclusive of the dynamic downloading of policies) in the service provider network. The operations can be carried out through software or other elements provided in policy element 24, along with SIP session control element 16 and SBCs 18 a and 18 b. Specifically, policy element 24 will include policy definitions and, further, will be systematically queried for information in making decisions as to how to accommodate requested communications involving various Enterprises.
Note that before turning to the example flow of
The components of TelePresence use technologies in conjunction with specialized applications and hardware to create an approachable solution using the network and unified communications as core components. TelePresence can use the standard IP technology deployed in corporations and can run on an integrated voice, video, and data network. The system supports high quality, real-time voice, and video communications with branch offices using broadband connections. It offers capabilities for ensuring quality of service (QoS), security, reliability, and high availability for high-bandwidth applications such as video, particularly high-definition video.
This TelePresence architecture offers an “in-person” meeting experience over the converged network. TelePresence delivers real-time, face-to-face interactions between people and places in their work and personal lives using advanced visual, audio, and collaboration technologies. These technologies transmit life-size, high-definition images and spatial discrete audio.
In the example of
Note that the service providers may leverage several SBCs for scalability and functionality distribution. In addition, the context of this particular example is a VPN environment. For this example, we assume that user name or call numbers are unique across different VPNs. In broader terms, a unique identifier is implemented, where the username and the call numbers constitute a unique identifier couple.
In terms of the pre-configured SBC VPN information, the SBC virtual interface configuration and the virtual routing/forwarding instance (VRF) configuration are pre-configured for each VPN business customer. Furthermore, there is a pre-configured policy for each B2B customer signaling entity or VPN site holding service and subscription details, as described in the contract between the service provider and the business customer. These policy elements are stored either on policy element 24 or on SBCs 18 a and 18 b.
In regards to security considerations, it is expected that there is a secure path to communicate between the two SIP end points. There are multiple methods to achieve this. For example, a multiprotocol label switching (MPLS-VPN) network offers built in security (i.e., traffic between the two SIP endpoints is generally isolated via an extranet, which represents a special case of MPLS VPN networking technology). In addition, two SIP signaling entities can also authenticate each other using authentications methods (for instance, the SBC and the customer signaling entities). B2B security is generally provided by the SBC, which can include topology hiding, NAT/address hiding, rate limiting, distributed denial of service (DDOS) protection, authenticated signaling, and media forwarding based on proper signaling sequence. Policy checking is another level of security protection. It is commonly based on an external policy element and/or SBC based policies (policy element and SBC are possible policy service entities).
Turning now to the example flow of
Note that at a theoretical step 0 (not shown), there is a VPN business customer basic pre-configuration. At step 1, there is a CSE registration with a PSE (e.g., an SBC). More specifically, the provider signaling instance(s), in this instance the SBC(s), is interfacing with each party's signaling entity, which is (are) contacted for registration by each customer signaling entity. Registration messages contain specific information about the signaling entity, namely IP address for the signaling entity, and the registered endpoints characteristics.
The SBC can make a mapping between the signaling entity information and the pre-configured SBC VPN information necessary for a future dynamic configuration.
Specifically, this may include:
1) Incoming SBC virtual interface. Based on this information, the SBC can determine VPN information associated with that incoming virtual interface.
2) Source IP address of the signaling entity and /or fully qualified domain name (FQDN).
3) Characteristics of the endpoints (e.g., prefixes and domain names, etc.).
In the event that a business customer decides to prohibit a multimedia endpoint from participating in a B2B call, they can achieve this by not allowing this endpoint's information to be sent out by the signaling entity to the SBC. The above step can take place for all customers.
At step 2, there is a SIP adjacency configuration (SIP or any communication protocol for the multimedia communication session) created by the PSE. This shows how the SBCs are configured, where adjacency should be defined for each Enterprise. The connection between the Enterprise and the service provider, in this example, can be thought of as a trunk. This could define the nature of the communication, the interface to be used, etc.
More specifically for step 2, the SBC can build adjacency configuration for all information gathered from the registration of each entity (for each customer VPN). This configuration may also be generated dynamically by an external application, in which case the dynamically generated configuration can be pushed onto the SBC either directly or via external application program interfaces (APIs).
By way of example, below is a sample SBC adjacency configuration:
At step 3 a, a business-to-business session is initiated by an endpoint in the customer A area to another endpoint in the customer B area. Thus, step 3 a is depicting a B2B call initiated by customer A for customer B. At step 3 b, the SBC checks in its local database for a log of an existing call (or prior configuration) between the two endpoints for the business-to-business session requested. If an entry exists, it will reset the expire timer and proceed to step 4. If there is no entry or the entry timed out or is incomplete, it will proceed to step 3 c.
Thus, in step 3 b, the query pertains to whether there is an existing SBC configuration. Step 3 b is asking about a previous configuration because there could be a time savings in understanding that there is an existing connection, or that policy element 24 has already been queried for certain information. Where there is an existing configuration, then the call can be expedited.
At step 3 c, credential negotiation with policy element 24, by an SBC, occurs. Step 3e illustrates a call drop, where the call is prohibited. In step 3 c, the SBC is negotiating directly with policy element 24 (i.e., the SBC is getting a call from a given customer, so a query is made as to what the policy is for this particular customer). The policy could be simple or sophisticated (e.g., a simple payment plan verification, a prepayment policy issue, etc.).
At step 3 d, the system can create and apply session routing configuration in the SBC for A and B. (Note that ‘session routing’ includes voice calls, as well as other types of communications such as multi-media, for example.) If the policy element does authorize this particular communication, the devices create the necessary configuration and apply the session routing configuration for the call between Enterprise A and Enterprise B. Without the session routing functionality, Enterprise A will not be able to communicate with Enterprise B. Thus, the routing protocol is being dictated by the policy element, where the subsequent configuration is downloaded to the responsible SBC.
Thus, the SBC contacts the policy service entity (policy element 24) for this specific set of signaling entities, corresponding to two specific customer VPN sites. The SBC obtains from the policy service entity the corresponding communication policy for these implicated customers. For instance, for signaling entities A and B in VPN A and VPN B respectively, the SBC will query the policy element and find out (in a simplistic example):
The definition of a customer policy may be purely about whether the B2B service was contracted from the service provider and whether A agrees to have a B2B relation with customer B. Other examples of policy granular settings include maximum bandwidth, maximum number of sites, quality of service (QoS) classifications and marking, etc. For example, VPN A and VPN B may have agreed to be able to be connected for a business-to-business connection and purchased the corresponding service. It may be that VPN B was also set to be able to communicate with VPN C, but that VPN A would be not able to communicate with VPN C, for security reasons or because A and C did not purchase the service agreement for this specific communication.
Based on the policy result, the SBC will or will not dynamically build and add an input in the session routing table configuration. As mentioned earlier, the configuration can be generated by the SBC itself, by a routing policy service, a network management provisioning application, or a simple script. The dynamically generated configuration for the session routing table can be pushed onto the SBC either directly, indirectly, or via external APIs.
Once the configuration is successfully pushed, a routing and session (establishment) entry can be stored on the SBC, with a timer, which can be initiated at that point. For example:
Turning back to step 4 of the flowchart of
In terms of highlighting some (not necessarily all) of the advantages of the architecture of communication system 10 and the previously discussed flows, such protocols do dynamically and selectively capture and parse key identifier and service parameters for each party. The architecture further dynamically creates appropriate configurations for the network entities, enabling a secure communication between the two parties. Moreover, by using policy elements, as part of the integrated process, the policy elements built-in functionality ensures that the sessions are granularly logged, accounted for, and are set up with respect to existing customer contracted policies (e.g., with their service provider).
In providing this approach, such a solution enables high-quality multimedia sessions for all platforms, such as, for instance, (but not limited to) TelePresence. Similarly, the arrangement takes a process and solution approach, which ties in security, unified communications, and better management of emerging technologies.
Software and/or hardware (inclusive of memories and processors that can execute any software application) may reside in billing element 22, and/or policy element 24, and/or SIP session control element 16, and/or SBCs 18 a and 18 b in order to achieve the teachings of the present invention. The software can offer the communication enhancements (outlined herein) and could be stored in any type of memory and subsequently executed by any type of processor to carry out the functionalities explained in this Specification. In one instance, only the element of these listed devices includes software (in a consolidated fashion) in order to achieve the operational advantages as outlined here. In other embodiments, any of these components may be consolidated, or any one of these can be eliminated, or added to the system elsewhere, while remaining within the broad scope of the present invention. Due to their flexibility, these items may alternatively be equipped with (or include) any suitable algorithm, hardware, component, device, application specific integrated circuit (ASIC), processor, microprocessor, algorithm, read-only memory (ROM) element, random access memory (RAM) element, erasable programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), field-programmable gate array (FPGA), or any other suitable element or object that is operable to facilitate the operations thereof. Considerable flexibility is provided by the structure of these outlined configurations in the context of communication system 10 and, accordingly, they should be construed as such.
Note that the examples of the preceding FIGURES have been offered for purposes of teaching only. Accordingly, some of these discussed steps may be changed, deleted, or replaced with other steps where appropriate. Such modifications may be based on particular communication needs or specific communication architectures and configurations and are within the teachings of the present invention.
As explained above, the lack of an effective communication support in static manual configurations has been a known limitation in this arrangement. This invention addresses B2B arrangements, but could be deployed in a host of other scenarios. Any such scenarios are encompassed by this Specification.
Although the present invention has been described in detail with reference to particular embodiments, it should be understood that various other changes, substitutions, and alterations may be made hereto without departing from the spirit and scope of the present invention. For example, although the present invention has been described as operating in TelePresence environments or VPN arrangements, the present invention may be used in any networking environment that could include such technology. Virtually any configuration that seeks to intelligently provision a multimedia session connection could enjoy the benefits of the present invention. Moreover, the invention can be implemented in any multimedia (or other media) supporting system providing voice, video, or fax over a packet network service.
Numerous other changes, substitutions, variations, alterations, and modifications may be ascertained to one skilled in the art and it is intended that the present invention encompass all such changes, substitutions, variations, alterations, and modifications as falling within the scope of the appended claims. In order to assist the United States Patent and Trademark Office (USPTO) and, additionally, any readers of any patent issued on this application in interpreting the claims appended hereto, Applicant wishes to note that the Applicant: (a) does not intend any of the appended claims to invoke paragraph six (6) of 35 U.S.C. section 112 as it exists on the date of the filing hereof unless the words “means for” or “step for” are specifically used in the particular claims; and (b) does not intend, by any statement in the specification, to limit this invention in any way that is not otherwise reflected in the appended claims.